SlideShare a Scribd company logo
3
Most read
5
Most read
8
Most read
Machine to Machine Communications
(When the machines start talking)
Dr. Rajesh P Barnwal
Senior Scientist
AI & IoT Lab, Information Technology Group
CSIR-Central Mechanical Engineering Research Institute,
Durgapur
Disclaimer: This presentation is just for information purpose and compiled from materials (images + texts) available on Internet in public domain.
Today’s Factory
Source: Hewlett-Packard
Future’s Factory
Source: Hewlett-Packard
What makes the difference over here?
• The capability of communicating the customized requirements to the
assembly line
• The capability to customize the assembly sequence to meet on-demand
design requirements
• The capability of work synchronization between two non pre-configured
machines
• The capability of sensing each machines’ occupancy level and re-route
the manufacturing process
What is the enabling technology?
Machine to Machine (M2M) Communication
Technology
Let’s see where M2M can help?
Source: Youtube
Why companies are eyeing on M2M?
50-70 billion machines -1% connected
Mobile market (quasi) saturated
European Legislation pushes for SMART
Technology is available – Federation is key
M2M in Manufacturing
•An Industry 4.0 manufacturing industry -
•Comprises of:
• Smart machines
• Smart warehouses and
• Smart production facilities
•Should be capable of:
• autonomously exchanging information
• triggering actions
• controlling each other independently
M2M for human ease and efficiency
• It saves the human operator from repetitive, boring and
time consuming work
• It helps human operators in real-time working based on
data rather than experience
• It provides opportunities to evolve continuously
Summarily:
• Machine-to-Machine (M2M) means no human intervention
while devices are communicating end-to-end. [Mischa Dohler]
What is M2M?
•Its technology of communication between –
• Machine–sensor/actuator that is monitoring/actuating
• To–network to operate end-to-end communication
• Machine–device that is processing gathered information
Networks for M2M
• Wired (Ethernet, fiber optics etc.) – dedicated
cabling between sensors and gateway
• Pros: Very reliable, very high data rates, low
latency, secure
• Cons: Expensive to roll out, not scalable, no
mobility
• Wireless
• Capillary : Short-range link/ network
• Cellular : Long-range cellular network
Networks for M2M
•Wireless
• Capillary (WLAN, BLE, Zigbee etc.)
• pros: cheap-to-roll out, generally scalable, low power
• cons: short range, low rates, weaker security, interference,
lack of universal infrastructure/coverage
• Cellular (3G, LTE, WiMax etc.)
• pros: excellent coverage, mobility, roaming, generally secure,
infrastructure
• cons: expensive, not cheap to maintain, not power efficient, delays
Classification basis of M2M technologies
• Number of devices to
support
•Interconnections
• Coverage
Challenges in M2M Communications
• Design for huge number of devices
• Reduction of control signalling
• Optimization for low data transmissions
• Cost reduction
• Congestion control algorithms (for cellular)
• Load distribution/balancing
• Security, e.g., denial of service
• Traffic Models
Design of Capillary M2M
• Mostly embedded design, low power, low cost design
• Short-range communication systems
• Each node typically consists of these basic elements:
– Sensor
– Radio chip
– Microcontroller
– Energy supply
Design of Capillary M2M
• Targets:
• Low – cost
• Low – complexity
• Small – size
• Low – energy
• Problems:
• Different vendors (characteristics, inoperability between devices)
• Interference, fading
• MAC protocols were designed for humans
• Scalability
Designing M2M with Cellular technologies
• Advantages:
• Capillary networks only provide local coverage
• Users are already familiar with the infrastructure
• Easier configuration: suitable for short-term deployments
• Cellular networks provide ubiquitous coverage and global
connectivity today
• Mobility and High-Speed Data Transmission
• Interference can be managed
• Challenges for operators:
• Higher power requirements
• High cost and applications complexity
Current cellular M2M technologies
• Current cellular systems are designed for Human-to-human
(H2H):
• Not so many human users
• We tolerate delay even for voice connections
• We like to download a lot, mainly high-bandwidth data
• We are ok to recharge our mobiles daily.
• New paradigm:
• Enormous number of M2M nodes
• Applications are delay-intolerant (mainly control)
• No traffic/mainly uplink
• Nodes need to operate autonomously for a long time
• Automated security and trust mechanisms.
Optimization possibilities for M2M
• May be based on specific scenario requirement:
• Low Mobility – Reduce reporting frequency
• Time Controlled
• Time Tolerant – Applications that can delay transmissions
• Small Data Transmissions
• Priority Alarm Message – Maximum priority for alarm
traffic
• Secure Connection
• Location Specific Trigger – Location information from
operators
• Infrequent transmission
WiFi (HaLow) for M2M Communication
• IEEE 802.11ah use cases target low data rate, long range
applications (metering, sensors, automation)
• Battery operated devices should limit the power
consumption by:
• limiting the packet transmissions
• limiting the awake/receive time (for low transit power devices, RX
power consumption may be comparable with TX power
consumption)
• Listening for beacons/traffic information maps (TIM) frames
consumes power:
• clock drift during long sleep requires an early wake up
• reception of beacon may require several milliseconds
Future Roadmap
• Challenges for capillary community:
• Reliability: despite license-exempt bands
• Range: multihop/mesh seems to be a must
• Delays: minimize end-to-end delay
• Standards: interoperability
• Infrastructure: maintenance
• Challenges for cellular community:
• Nodes: management of huge amounts sending small packets
• Rates: fairly low and rather uplink from small packets
• Power: high efficiency
• Delays: quick wakeup after sleep
• Application: to operate not disturbing current networks.
Photo Source: Internet

More Related Content

PPT
Localization in WSN
PPTX
M2M - Machine to Machine Technology
PPTX
M2M technology in IOT
PPTX
Wireless Sensor Networks ppt
PDF
Edge Computing
PPTX
Swarm intelligence
PPT
Artificial Neural Network seminar presentation using ppt.
PPT
Autonomous Vehicles
Localization in WSN
M2M - Machine to Machine Technology
M2M technology in IOT
Wireless Sensor Networks ppt
Edge Computing
Swarm intelligence
Artificial Neural Network seminar presentation using ppt.
Autonomous Vehicles

What's hot (20)

PDF
Convolutional Neural Networks (CNN)
PPTX
Data enrichment
PPTX
Flying ad hoc network
PPTX
Ip packet delivery
PPTX
Internet of things (IOT) | Future Trends
PPTX
Unit 4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...
PDF
Artificial Neural Networks Lect3: Neural Network Learning rules
PPTX
Introduction to CNN
PDF
An IOT based Smart Traffic Management System
PPTX
Fuzzy Logic ppt
PDF
IoT based attendance system
PPTX
Soft computing
PPTX
Weather Forecasting using Deep Learning A lgorithm for the Ethiopian Context
PPTX
Neuro-fuzzy systems
PPTX
Knowledge representation In Artificial Intelligence
PPT
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
PPTX
Autonomous vehicles
PPTX
Internet of Things (IoT) - Seminar ppt
PDF
I.ITERATIVE DEEPENING DEPTH FIRST SEARCH(ID-DFS) II.INFORMED SEARCH IN ARTIFI...
PPTX
Domain specific IoT
Convolutional Neural Networks (CNN)
Data enrichment
Flying ad hoc network
Ip packet delivery
Internet of things (IOT) | Future Trends
Unit 4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...
Artificial Neural Networks Lect3: Neural Network Learning rules
Introduction to CNN
An IOT based Smart Traffic Management System
Fuzzy Logic ppt
IoT based attendance system
Soft computing
Weather Forecasting using Deep Learning A lgorithm for the Ethiopian Context
Neuro-fuzzy systems
Knowledge representation In Artificial Intelligence
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
Autonomous vehicles
Internet of Things (IoT) - Seminar ppt
I.ITERATIVE DEEPENING DEPTH FIRST SEARCH(ID-DFS) II.INFORMED SEARCH IN ARTIFI...
Domain specific IoT
Ad

Similar to Machine-to-Machine Communications (20)

PPTX
Manet ppt
PDF
DCCN 2016 - Protocols and technologies for IoT
PPTX
1. Introduction to Mobile Computing-1.pptx
PDF
From the Internet of Things to Intelligent Systems A Developer's Primer - Gar...
PDF
IoT Standards & Ecosystem
PPT
PPT
Unit-1 (1).ppt
PPTX
Asn unit 1
PPTX
A high level perspective on 5G technologies and applications
PPTX
WMN Chapter5.pptx
PDF
M2M Day One
PPTX
Artificial intelligence based 5 g communication dr.k.thilagam
PPTX
DCCN_EXL_AKB(22vsbbsbbsbsbsbsbsbbbsbs01020180).pptx
PPTX
Adoption of Next-Generation 5G Wireless Technology for “Smarter” Grid Design;...
PPTX
Delivered Guest Talk in Faculty Development Programme held on 27th July 2017 ...
PPTX
Smart CIties and the Iot systems. The topic discusses about IoT
PDF
M2M communications
PDF
Transformation From Today To Tomorrow - Market and Product Strategy 2018
PDF
Stop Wasting Energy on M2M
Manet ppt
DCCN 2016 - Protocols and technologies for IoT
1. Introduction to Mobile Computing-1.pptx
From the Internet of Things to Intelligent Systems A Developer's Primer - Gar...
IoT Standards & Ecosystem
Unit-1 (1).ppt
Asn unit 1
A high level perspective on 5G technologies and applications
WMN Chapter5.pptx
M2M Day One
Artificial intelligence based 5 g communication dr.k.thilagam
DCCN_EXL_AKB(22vsbbsbbsbsbsbsbsbbbsbs01020180).pptx
Adoption of Next-Generation 5G Wireless Technology for “Smarter” Grid Design;...
Delivered Guest Talk in Faculty Development Programme held on 27th July 2017 ...
Smart CIties and the Iot systems. The topic discusses about IoT
M2M communications
Transformation From Today To Tomorrow - Market and Product Strategy 2018
Stop Wasting Energy on M2M
Ad

More from Dr. Rajesh P Barnwal (11)

PDF
wekapresentation-130107115704-phpapp02.pdf
PPTX
Signage Format.pptx
PPTX
Cloud security: Industry Trends and Research Challenges
PPT
Application of Ground Penetrating Radar in Subsurface mapping
PPT
VANET, Security and Trust
PPT
10 lovely words
PPT
Introduction to Computer
PPT
Good e mail practices
PPT
Mine fire gallery modelling
PPT
Microprocessor based autonomous control system
PPT
Multimodal man machine interaction
wekapresentation-130107115704-phpapp02.pdf
Signage Format.pptx
Cloud security: Industry Trends and Research Challenges
Application of Ground Penetrating Radar in Subsurface mapping
VANET, Security and Trust
10 lovely words
Introduction to Computer
Good e mail practices
Mine fire gallery modelling
Microprocessor based autonomous control system
Multimodal man machine interaction

Recently uploaded (20)

PPTX
MYSQL Presentation for SQL database connectivity
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Encapsulation theory and applications.pdf
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Approach and Philosophy of On baking technology
PDF
Modernizing your data center with Dell and AMD
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Empathic Computing: Creating Shared Understanding
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
MYSQL Presentation for SQL database connectivity
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
The Rise and Fall of 3GPP – Time for a Sabbatical?
Encapsulation theory and applications.pdf
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Review of recent advances in non-invasive hemoglobin estimation
Approach and Philosophy of On baking technology
Modernizing your data center with Dell and AMD
20250228 LYD VKU AI Blended-Learning.pptx
Encapsulation_ Review paper, used for researhc scholars
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Advanced methodologies resolving dimensionality complications for autism neur...
Empathic Computing: Creating Shared Understanding
Network Security Unit 5.pdf for BCA BBA.
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf

Machine-to-Machine Communications

  • 1. Machine to Machine Communications (When the machines start talking) Dr. Rajesh P Barnwal Senior Scientist AI & IoT Lab, Information Technology Group CSIR-Central Mechanical Engineering Research Institute, Durgapur Disclaimer: This presentation is just for information purpose and compiled from materials (images + texts) available on Internet in public domain.
  • 4. What makes the difference over here? • The capability of communicating the customized requirements to the assembly line • The capability to customize the assembly sequence to meet on-demand design requirements • The capability of work synchronization between two non pre-configured machines • The capability of sensing each machines’ occupancy level and re-route the manufacturing process
  • 5. What is the enabling technology? Machine to Machine (M2M) Communication Technology
  • 6. Let’s see where M2M can help? Source: Youtube
  • 7. Why companies are eyeing on M2M? 50-70 billion machines -1% connected Mobile market (quasi) saturated European Legislation pushes for SMART Technology is available – Federation is key
  • 8. M2M in Manufacturing •An Industry 4.0 manufacturing industry - •Comprises of: • Smart machines • Smart warehouses and • Smart production facilities •Should be capable of: • autonomously exchanging information • triggering actions • controlling each other independently
  • 9. M2M for human ease and efficiency • It saves the human operator from repetitive, boring and time consuming work • It helps human operators in real-time working based on data rather than experience • It provides opportunities to evolve continuously Summarily: • Machine-to-Machine (M2M) means no human intervention while devices are communicating end-to-end. [Mischa Dohler]
  • 10. What is M2M? •Its technology of communication between – • Machine–sensor/actuator that is monitoring/actuating • To–network to operate end-to-end communication • Machine–device that is processing gathered information
  • 11. Networks for M2M • Wired (Ethernet, fiber optics etc.) – dedicated cabling between sensors and gateway • Pros: Very reliable, very high data rates, low latency, secure • Cons: Expensive to roll out, not scalable, no mobility • Wireless • Capillary : Short-range link/ network • Cellular : Long-range cellular network
  • 12. Networks for M2M •Wireless • Capillary (WLAN, BLE, Zigbee etc.) • pros: cheap-to-roll out, generally scalable, low power • cons: short range, low rates, weaker security, interference, lack of universal infrastructure/coverage • Cellular (3G, LTE, WiMax etc.) • pros: excellent coverage, mobility, roaming, generally secure, infrastructure • cons: expensive, not cheap to maintain, not power efficient, delays
  • 13. Classification basis of M2M technologies • Number of devices to support •Interconnections • Coverage
  • 14. Challenges in M2M Communications • Design for huge number of devices • Reduction of control signalling • Optimization for low data transmissions • Cost reduction • Congestion control algorithms (for cellular) • Load distribution/balancing • Security, e.g., denial of service • Traffic Models
  • 15. Design of Capillary M2M • Mostly embedded design, low power, low cost design • Short-range communication systems • Each node typically consists of these basic elements: – Sensor – Radio chip – Microcontroller – Energy supply
  • 16. Design of Capillary M2M • Targets: • Low – cost • Low – complexity • Small – size • Low – energy • Problems: • Different vendors (characteristics, inoperability between devices) • Interference, fading • MAC protocols were designed for humans • Scalability
  • 17. Designing M2M with Cellular technologies • Advantages: • Capillary networks only provide local coverage • Users are already familiar with the infrastructure • Easier configuration: suitable for short-term deployments • Cellular networks provide ubiquitous coverage and global connectivity today • Mobility and High-Speed Data Transmission • Interference can be managed • Challenges for operators: • Higher power requirements • High cost and applications complexity
  • 18. Current cellular M2M technologies • Current cellular systems are designed for Human-to-human (H2H): • Not so many human users • We tolerate delay even for voice connections • We like to download a lot, mainly high-bandwidth data • We are ok to recharge our mobiles daily. • New paradigm: • Enormous number of M2M nodes • Applications are delay-intolerant (mainly control) • No traffic/mainly uplink • Nodes need to operate autonomously for a long time • Automated security and trust mechanisms.
  • 19. Optimization possibilities for M2M • May be based on specific scenario requirement: • Low Mobility – Reduce reporting frequency • Time Controlled • Time Tolerant – Applications that can delay transmissions • Small Data Transmissions • Priority Alarm Message – Maximum priority for alarm traffic • Secure Connection • Location Specific Trigger – Location information from operators • Infrequent transmission
  • 20. WiFi (HaLow) for M2M Communication • IEEE 802.11ah use cases target low data rate, long range applications (metering, sensors, automation) • Battery operated devices should limit the power consumption by: • limiting the packet transmissions • limiting the awake/receive time (for low transit power devices, RX power consumption may be comparable with TX power consumption) • Listening for beacons/traffic information maps (TIM) frames consumes power: • clock drift during long sleep requires an early wake up • reception of beacon may require several milliseconds
  • 21. Future Roadmap • Challenges for capillary community: • Reliability: despite license-exempt bands • Range: multihop/mesh seems to be a must • Delays: minimize end-to-end delay • Standards: interoperability • Infrastructure: maintenance • Challenges for cellular community: • Nodes: management of huge amounts sending small packets • Rates: fairly low and rather uplink from small packets • Power: high efficiency • Delays: quick wakeup after sleep • Application: to operate not disturbing current networks.